SlideShare a Scribd company logo
1 of 16
EC05.02b Internet Security Issues 1
E-Commerce I
Analyzing Secure Websites
EC05.02b Internet Security Issues 2
Secure websites
Definition
Security confirmation
EC05.02b Internet Security Issues 3
What is a secure website?
A secure website is one that uses data
encryption to protect all information.
EC05.02b Internet Security Issues 4
How can you tell a site is secure?
There are three ways to confirm that a
website is secure:
Click the VeriSign icon to verify that
the certificate is valid.
A secure page should include a small
padlock symbol displayed on the
bottom line of your browser.
On a secure page, in the browser
address box, the URL will begin with
an https: prefix rather than the
standard http: prefix. The s means
that the page is secure.
EC05.02b Internet Security Issues 5
Identity theft
Definition
Types of identity theft
Examples of identity theft
Protect against identity theft
EC05.02b Internet Security Issues 6
Definition
 Any instance where a
person uses someone
else's identification
documents or other
identifiers in order to
impersonate that person.
 It intrudes into many areas
of people’s daily lives.
EC05.02b Internet Security Issues 7
Types of identity theft
Financial fraud - includes bank
fraud, credit card fraud, computer
and telecommunications fraud,
social program fraud, tax refund
fraud, mail fraud, and several
more.
EC05.02b Internet Security Issues 8
Types of identity theft
Criminal activities - involves taking
on someone else's identity in
order to commit a crime, enter a
country, obtain special permits,
hide one's own identity, or commit
acts of terrorism.
EC05.02b Internet Security Issues 9
Types of identity theft
Credit card fraud is identity theft in
its most simple and common form.
It can be accomplished either by a
thief who steals your account
number or when your pre-
approved credit card offers fall
into the wrong hands.
EC05.02b Internet Security Issues 10
Common modes of identity theft:
Dumpster diving - Dug out of trash cans and
dumpsters
Memorized or copied by sales clerks and
waiters
Removed from mailboxes in the form of tax
notices, financial account statements, and
other bills
Removed from your employer's files, either
secretly or with the help of an inside
accomplice
Removed from hospital records, usually with
the help of an inside accomplice
Removed from your financial lender's files
Examples of identity theft
EC05.02b Internet Security Issues 11
Common modes of identity theft:
Removed from your landlord's files
Purchased (or found free) in online (or offline)
databases
Collected from "cloned" Web sites - someone
may recreate a legitimate merchant Web site in
order to capture your personal information and
credit card information when you place an order.
Stolen from a merchant database through
computer hacking (not as simple as other forms
of theft)
Snatched using software that mirrors keystrokes
to capture credit card account information
More Examples of identity theft
EC05.02b Internet Security Issues 12
Ways to protect yourself
 DON'T give out your Social Security number
unless it’s critical.
 DESTROY any unwanted credit card offers.
 ONLY include your name and address on
checks.
 SHRED (cross-cut) any sensitive documents
before discarding.
 DON'T carry your Social Security card, passport,
or birth certificate in your wallet or purse.
 REVIEW your credit report annually to verify its
accuracy.
EC05.02b Internet Security Issues 13
More Ways to protect yourself
 NEVER give out personal information on the phone
to someone you don't know and who initiated the
call.
 REVIEW your credit card statement each month to
make sure there are no unauthorized charges.
 DON'T mail bills or documents that contain personal
data (like tax forms or checks) from your personal
mail box.
 If you're ever denied credit, FIND OUT WHY.
 REACT QUICKLY if a creditor calls about charges
you didn't make.
 GUARD deposit slips as closely as you do checks.
EC05.02b Internet Security Issues 14
What is Netiquette?
 "Netiquette" is network
etiquette, the do's and don'ts of
online communication.
 Netiquette includes both
common courtesy online and
the informal "rules of the road"
of cyberspace.
 In other words, Netiquette is a
set of rules for behaving
properly online.
EC05.02b Internet Security Issues 15
Core Rules of Netiquette
Rule 1: Remember the Human
Rule 2: Adhere to the same standards of behavior online that you follow in
real life
Rule 3: Know where you are in cyberspace
Rule 4: Respect other people's time and bandwidth
Rule 5: Make yourself look good online
Rule 6: Share expert knowledge
Rule 7: Help keep flame wars under control
Rule 8: Respect other people's privacy
Rule 9: Don't abuse your power
Rule 10: Be forgiving of other people's mistakes
http://www.albion.com/netiquette/corerules.html
EC05.02b Internet Security Issues 16
Sources
 “Electronic Commerce.” 1999.
http://www.wapa.gov/CorpSrvs/procurmt/ecomm.htm (2 Jan 2006).
 Stein, Lincoln D. “WWW Security FAQ: What’s New.” 2000.
http://www.w3.org/Security/Faq/www-security-faq.html (2 Jan 2006)
 Strom, David. “The Challenge of Electronic Commerce: Selling
Lemonade has Never Been This Tough.” 2000.
http://www.strom.com/pubwork/ecommerce.html (2 Jan. 2006).
 “Bureau of Industry and Security.” US Department of Commerce
http://www.bis.doc.gov/ComplianceAndEnforcement/E-Commerce.htm (2
Jan 2006)
 Electronic Commerce NC WiseOwl
http://www.mywiseowl.com/articles/Electronic_commerce (2 Jan 2006)
 Kennedy, Dennis, An Internet Tool Kit for E-Commerce Law Jan 15,
2001 The John Marshall Law School (2 Jan 2006)

More Related Content

What's hot

What's hot (20)

Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
Identity Theft
Identity Theft Identity Theft
Identity Theft
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
Chase phising mail example
Chase phising mail exampleChase phising mail example
Chase phising mail example
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
5 Tips for Protecting Your Checking Account
5 Tips for Protecting Your Checking Account5 Tips for Protecting Your Checking Account
5 Tips for Protecting Your Checking Account
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14
 
e-Fraud ppt
e-Fraud ppte-Fraud ppt
e-Fraud ppt
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention
 
Phishing
PhishingPhishing
Phishing
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 

Viewers also liked

STEM Resources for K-12 Educators
STEM Resources for K-12 EducatorsSTEM Resources for K-12 Educators
STEM Resources for K-12 Educators
Dr. TJ Wolfe
 
Overview Of Major Project Efforts
Overview Of Major Project EffortsOverview Of Major Project Efforts
Overview Of Major Project Efforts
skvanbibber
 
Effects of the_internet_on_education_and_training
Effects of the_internet_on_education_and_trainingEffects of the_internet_on_education_and_training
Effects of the_internet_on_education_and_training
Dr. TJ Wolfe
 
Characteristics and purpose_of_e_commercei
Characteristics and purpose_of_e_commerceiCharacteristics and purpose_of_e_commercei
Characteristics and purpose_of_e_commercei
Dr. TJ Wolfe
 
Analyzinglegislation
AnalyzinglegislationAnalyzinglegislation
Analyzinglegislation
Dr. TJ Wolfe
 
Effects of the_internet_on_consumers_and_businesses
Effects of the_internet_on_consumers_and_businessesEffects of the_internet_on_consumers_and_businesses
Effects of the_internet_on_consumers_and_businesses
Dr. TJ Wolfe
 
Pengutipan Dana Kerja Sosial Komuniti
Pengutipan Dana Kerja Sosial KomunitiPengutipan Dana Kerja Sosial Komuniti
Pengutipan Dana Kerja Sosial Komuniti
Engku Fatin
 
Analyzing internetsecurity
Analyzing internetsecurityAnalyzing internetsecurity
Analyzing internetsecurity
Dr. TJ Wolfe
 
Tech Integration for Dummies. A Simple 5 Step Plan
Tech Integration for Dummies. A Simple 5 Step PlanTech Integration for Dummies. A Simple 5 Step Plan
Tech Integration for Dummies. A Simple 5 Step Plan
Dr. TJ Wolfe
 
Storyboarding and planning_your_website
Storyboarding and planning_your_websiteStoryboarding and planning_your_website
Storyboarding and planning_your_website
Dr. TJ Wolfe
 

Viewers also liked (15)

STEM Resources for K-12 Educators
STEM Resources for K-12 EducatorsSTEM Resources for K-12 Educators
STEM Resources for K-12 Educators
 
Overview Of Major Project Efforts
Overview Of Major Project EffortsOverview Of Major Project Efforts
Overview Of Major Project Efforts
 
Effects of the_internet_on_education_and_training
Effects of the_internet_on_education_and_trainingEffects of the_internet_on_education_and_training
Effects of the_internet_on_education_and_training
 
Characteristics and purpose_of_e_commercei
Characteristics and purpose_of_e_commerceiCharacteristics and purpose_of_e_commercei
Characteristics and purpose_of_e_commercei
 
Cache
CacheCache
Cache
 
Newspapers
NewspapersNewspapers
Newspapers
 
Analyzinglegislation
AnalyzinglegislationAnalyzinglegislation
Analyzinglegislation
 
Effects of the_internet_on_consumers_and_businesses
Effects of the_internet_on_consumers_and_businessesEffects of the_internet_on_consumers_and_businesses
Effects of the_internet_on_consumers_and_businesses
 
Pengutipan Dana Kerja Sosial Komuniti
Pengutipan Dana Kerja Sosial KomunitiPengutipan Dana Kerja Sosial Komuniti
Pengutipan Dana Kerja Sosial Komuniti
 
Analyzing internetsecurity
Analyzing internetsecurityAnalyzing internetsecurity
Analyzing internetsecurity
 
Tech Integration for Dummies. A Simple 5 Step Plan
Tech Integration for Dummies. A Simple 5 Step PlanTech Integration for Dummies. A Simple 5 Step Plan
Tech Integration for Dummies. A Simple 5 Step Plan
 
Storyboarding and planning_your_website
Storyboarding and planning_your_websiteStoryboarding and planning_your_website
Storyboarding and planning_your_website
 
Principles design lecture
Principles design lecturePrinciples design lecture
Principles design lecture
 
35 Attitudes and Behaviours Ideal for Success in today's World of Work
35 Attitudes and Behaviours Ideal for Success in today's World of Work35 Attitudes and Behaviours Ideal for Success in today's World of Work
35 Attitudes and Behaviours Ideal for Success in today's World of Work
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 

Similar to Analyzing securewebsites

Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
efandeye
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Rat
megg16
 

Similar to Analyzing securewebsites (20)

Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theft
 
cyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxcyber security presentation 1234567.pptx
cyber security presentation 1234567.pptx
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Be prepared to deal with fraud for web
Be prepared to deal with fraud for webBe prepared to deal with fraud for web
Be prepared to deal with fraud for web
 
Self-Sovereign-Identity.pptx
Self-Sovereign-Identity.pptxSelf-Sovereign-Identity.pptx
Self-Sovereign-Identity.pptx
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
Reducing Fraud with the Right SSL Certificate in E-Commerce
Reducing Fraud with the Right SSL Certificate in E-CommerceReducing Fraud with the Right SSL Certificate in E-Commerce
Reducing Fraud with the Right SSL Certificate in E-Commerce
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd
 
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Rat
 
Phishing
PhishingPhishing
Phishing
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application Fraud
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwal
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
What to do after a data breach
What to do after a data breachWhat to do after a data breach
What to do after a data breach
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 

Recently uploaded

IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
17thcssbs2
 
Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tube
SaadHumayun7
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdf
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tube
 
The Ultimate Guide to Social Media Marketing in 2024.pdf
The Ultimate Guide to Social Media Marketing in 2024.pdfThe Ultimate Guide to Social Media Marketing in 2024.pdf
The Ultimate Guide to Social Media Marketing in 2024.pdf
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
Operations Management - Book1.p  - Dr. Abdulfatah A. SalemOperations Management - Book1.p  - Dr. Abdulfatah A. Salem
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
Word Stress rules esl .pptx
Word Stress rules esl               .pptxWord Stress rules esl               .pptx
Word Stress rules esl .pptx
 
philosophy and it's principles based on the life
philosophy and it's principles based on the lifephilosophy and it's principles based on the life
philosophy and it's principles based on the life
 
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptxREPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024
 

Analyzing securewebsites

  • 1. EC05.02b Internet Security Issues 1 E-Commerce I Analyzing Secure Websites
  • 2. EC05.02b Internet Security Issues 2 Secure websites Definition Security confirmation
  • 3. EC05.02b Internet Security Issues 3 What is a secure website? A secure website is one that uses data encryption to protect all information.
  • 4. EC05.02b Internet Security Issues 4 How can you tell a site is secure? There are three ways to confirm that a website is secure: Click the VeriSign icon to verify that the certificate is valid. A secure page should include a small padlock symbol displayed on the bottom line of your browser. On a secure page, in the browser address box, the URL will begin with an https: prefix rather than the standard http: prefix. The s means that the page is secure.
  • 5. EC05.02b Internet Security Issues 5 Identity theft Definition Types of identity theft Examples of identity theft Protect against identity theft
  • 6. EC05.02b Internet Security Issues 6 Definition  Any instance where a person uses someone else's identification documents or other identifiers in order to impersonate that person.  It intrudes into many areas of people’s daily lives.
  • 7. EC05.02b Internet Security Issues 7 Types of identity theft Financial fraud - includes bank fraud, credit card fraud, computer and telecommunications fraud, social program fraud, tax refund fraud, mail fraud, and several more.
  • 8. EC05.02b Internet Security Issues 8 Types of identity theft Criminal activities - involves taking on someone else's identity in order to commit a crime, enter a country, obtain special permits, hide one's own identity, or commit acts of terrorism.
  • 9. EC05.02b Internet Security Issues 9 Types of identity theft Credit card fraud is identity theft in its most simple and common form. It can be accomplished either by a thief who steals your account number or when your pre- approved credit card offers fall into the wrong hands.
  • 10. EC05.02b Internet Security Issues 10 Common modes of identity theft: Dumpster diving - Dug out of trash cans and dumpsters Memorized or copied by sales clerks and waiters Removed from mailboxes in the form of tax notices, financial account statements, and other bills Removed from your employer's files, either secretly or with the help of an inside accomplice Removed from hospital records, usually with the help of an inside accomplice Removed from your financial lender's files Examples of identity theft
  • 11. EC05.02b Internet Security Issues 11 Common modes of identity theft: Removed from your landlord's files Purchased (or found free) in online (or offline) databases Collected from "cloned" Web sites - someone may recreate a legitimate merchant Web site in order to capture your personal information and credit card information when you place an order. Stolen from a merchant database through computer hacking (not as simple as other forms of theft) Snatched using software that mirrors keystrokes to capture credit card account information More Examples of identity theft
  • 12. EC05.02b Internet Security Issues 12 Ways to protect yourself  DON'T give out your Social Security number unless it’s critical.  DESTROY any unwanted credit card offers.  ONLY include your name and address on checks.  SHRED (cross-cut) any sensitive documents before discarding.  DON'T carry your Social Security card, passport, or birth certificate in your wallet or purse.  REVIEW your credit report annually to verify its accuracy.
  • 13. EC05.02b Internet Security Issues 13 More Ways to protect yourself  NEVER give out personal information on the phone to someone you don't know and who initiated the call.  REVIEW your credit card statement each month to make sure there are no unauthorized charges.  DON'T mail bills or documents that contain personal data (like tax forms or checks) from your personal mail box.  If you're ever denied credit, FIND OUT WHY.  REACT QUICKLY if a creditor calls about charges you didn't make.  GUARD deposit slips as closely as you do checks.
  • 14. EC05.02b Internet Security Issues 14 What is Netiquette?  "Netiquette" is network etiquette, the do's and don'ts of online communication.  Netiquette includes both common courtesy online and the informal "rules of the road" of cyberspace.  In other words, Netiquette is a set of rules for behaving properly online.
  • 15. EC05.02b Internet Security Issues 15 Core Rules of Netiquette Rule 1: Remember the Human Rule 2: Adhere to the same standards of behavior online that you follow in real life Rule 3: Know where you are in cyberspace Rule 4: Respect other people's time and bandwidth Rule 5: Make yourself look good online Rule 6: Share expert knowledge Rule 7: Help keep flame wars under control Rule 8: Respect other people's privacy Rule 9: Don't abuse your power Rule 10: Be forgiving of other people's mistakes http://www.albion.com/netiquette/corerules.html
  • 16. EC05.02b Internet Security Issues 16 Sources  “Electronic Commerce.” 1999. http://www.wapa.gov/CorpSrvs/procurmt/ecomm.htm (2 Jan 2006).  Stein, Lincoln D. “WWW Security FAQ: What’s New.” 2000. http://www.w3.org/Security/Faq/www-security-faq.html (2 Jan 2006)  Strom, David. “The Challenge of Electronic Commerce: Selling Lemonade has Never Been This Tough.” 2000. http://www.strom.com/pubwork/ecommerce.html (2 Jan. 2006).  “Bureau of Industry and Security.” US Department of Commerce http://www.bis.doc.gov/ComplianceAndEnforcement/E-Commerce.htm (2 Jan 2006)  Electronic Commerce NC WiseOwl http://www.mywiseowl.com/articles/Electronic_commerce (2 Jan 2006)  Kennedy, Dennis, An Internet Tool Kit for E-Commerce Law Jan 15, 2001 The John Marshall Law School (2 Jan 2006)